Monday, February 28, 2011

Identity Threat Assessment

"Outsourcing covert intelligence technology and/or services to a private entity(s) is risky in the extreme. When the general turned president warned us of this a half-century ago, little could he have known about the implications in a sometimes covertly-controlled connected world that we have today. Is the country's agency in charge of guarding against that possibility really able to do so? If not, how can we get there?"

Identities organize at or near the top in the machine. The integrity of the mechanism that supports this is essential as is its simplicity. Relying on documents alone, no matter how useful in the past, is simply not sufficient.

The integrity of certifiable trust profiles for each member is the life blood of this new organization. Constantly improving the carefully measured immune response to competition for this critical function acknowledges that other organizations can be, and often are, naturally predisposed to find weaknesses in the model.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN